### [CVE-2017-9793](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-9793) ![](https://img.shields.io/static/v1?label=Product&message=Apache%20Struts&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=A%20remote%20attacker%20may%20create%20a%20DoS%20attack%20by%20sending%20crafted%20xml%20request%20when%20using%20the%20Struts%20REST%20plugin&color=brighgreen) ### Description The REST Plugin in Apache Struts 2.1.x, 2.3.7 through 2.3.33 and 2.5 through 2.5.12 is using an outdated XStream library which is vulnerable and allow perform a DoS attack using malicious request with specially crafted XML payload. ### POC #### Reference No PoCs from references. #### Github - https://github.com/0xm4ud/S2-045-and-S2-052-Struts-2-in-1 - https://github.com/ARPSyndicate/cvemon - https://github.com/IkerSaint/VULNAPP-vulnerable-app - https://github.com/khodges42/Etrata - https://github.com/m4udSec/S2-045-and-S2-052-Struts-2-in-1 - https://github.com/pctF/vulnerable-app